bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

248
active users

#aisecurity

1 post1 participant0 posts today
Sanjaymenon<p>NetSPI’s Open LLM Security Benchmark: Balancing Security &amp; Usability of Large Language Models (LLMs)</p><p><a href="https://github.com/NetSPI/Open-LLM-Security-Benchmark" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NetSPI/Open-LLM-Sec</span><span class="invisible">urity-Benchmark</span></a></p><p><a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/aisecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aisecurity</span></a></p>
0x40k<p>AI in the security field? Yeah, it can definitely lend a hand, BUT let's be real here. Automated tools are just *not* a substitute for an experienced pentester's intuition and skills.</p><p>Sure, these tools might flag the obvious vulnerabilities – the low-hanging fruit, if you will. However, the *real* breakthroughs, those crucial "aha!" moments? They almost always come from actual human brainpower and critical thinking.</p><p>Plus, think about it: who's actually vetting the results the AI spits out? Without that critical human oversight, you could easily drown in a sea of "findings," completely unsure of what genuinely needs urgent attention. Security is so much more than just hitting 'scan'; it’s a continuous, evolving process! Definitely something to keep in mind.</p><p>And on a related note, let's not forget the persistent threats out there. State-sponsored cyber warfare is a serious concern, and actors like Russia are definitely a significant force to reckon with in that arena.</p><p>So, what's your experience been using AI in pentesting? Drop your thoughts below!</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p>
IT News<p>Cloudflare turns AI against itself with endless maze of irrelevant facts - On Wednesday, web infrastructure provider Cloudflare announced a new featu... - <a href="https://arstechnica.com/ai/2025/03/cloudflare-turns-ai-against-itself-with-endless-maze-of-irrelevant-facts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/ai/2025/03/clo</span><span class="invisible">udflare-turns-ai-against-itself-with-endless-maze-of-irrelevant-facts/</span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/machinelearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>machinelearning</span></a> <a href="https://schleuss.online/tags/aisecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aisecurity</span></a> <a href="https://schleuss.online/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
OWASP Foundation<p>👀 OWASP Global AppSec EU 2025 Barcelona Day 1 Agenda Sneak Peek!</p><p>The full agenda is now live on our website, and we're kicking things off in Barcelona with an incredible first day! Join in on training sessions on AI Whiteboard Hacking, Full-Stack Pentesting, and iOS and Andriod App Security on day 1.</p><p>👉 <a href="https://owasp.glueup.com/event/owasp-global-appsec-eu-2025-123983/home.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/owasp-g</span><span class="invisible">lobal-appsec-eu-2025-123983/home.html</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/AppSecEU2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSecEU2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Barcelona" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Barcelona</span></a></p>
0x40k<p>Okay, so AI in Pentesting, huh? 🤖 It's definitely a hot topic! A lot of folks instantly worry about losing their jobs, but let's be real: aren't we pentester basically problem-solvers?</p><p>Thing is, AI *can* actually help us speed up the simpler stuff. Think OSINT, CVE checks, and even report writing – AI could give us a boost there. And that would give us *more* time to focus on the really tricky hacks.</p><p>But hey, a word of caution: AI is just a tool, folks. It's not a magic bullet. Creativity and solid experience *still* matter big time! And let's not forget, security *solely* reliant on AI is just plain wrong. Seriously, certificates or no certificates, a company is NOT secure without good old-fashioned manual pentesting.</p><p>What are your thoughts? 🤔 <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a></p>
Sean Martin 🎙️✨:verified_paw: :donor:<p>Hackers are taking action where others have failed—warning ransomware victims, exposing AI security flaws, and questioning biohacking ethics. Should policymakers pay more attention to hacker research? Listen now and decide. </p><p><a href="https://youtu.be/K2Y_cLxhMuw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/K2Y_cLxhMuw</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defcon</span></a> <a href="https://infosec.exchange/tags/defcon32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defcon32</span></a> <a href="https://infosec.exchange/tags/HackersAlmanack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackersAlmanack</span></a></p>
nonlinear<p>Solutions? Allow-lists (members can only connect with approved third-parties), app transparency (good luck with that), certifications (or, social allow-lists).</p><p>Model Context Protocol adoption will usher an ecology of highly specialized AI tools, and that's a good thing. But can we have it with privacy?</p><p>Thoughts?</p><p><a href="https://social.praxis.nyc/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://social.praxis.nyc/tags/TechEthics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechEthics</span></a> <a href="https://social.praxis.nyc/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a></p>
Giskard<p>◆ Hallucination and factual accuracy<br>◆ Bias and fairness<br>◆ Resistance to adversarial attacks<br>◆ Harmful content prevention</p><p>The LLM Benchmark incorporates diverse linguistic and cultural contexts to ensure comprehensiveness, and representative samples will be open-source. </p><p>Read about our methodology, and early findings: <a href="https://gisk.ar/3CRFdeB" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gisk.ar/3CRFdeB</span><span class="invisible"></span></a> </p><p>We will be sharing more results in the coming months 👀</p><p><a href="https://fosstodon.org/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://fosstodon.org/tags/AITesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AITesting</span></a> <a href="https://fosstodon.org/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a> <a href="https://fosstodon.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
LMG Security<p>Open Source AI Models are a growing cybersecurity risk.</p><p>Organizations are increasingly using AI models from repositories like Hugging Face and TensorFlow Hub—but are they considering the hidden cybersecurity risks? Attackers are slipping malicious code into AI models, bypassing security checks, and exploiting vulnerabilities.</p><p>New research shows that bad actors are leveraging open-source AI models to introduce backdoors, execute arbitrary code, and even manipulate model outputs. If your team is developing AI solutions, now is the time to secure your AI supply chain by: </p><p>🔹 Vetting model sources rigorously<br>🔹 Avoiding vulnerable data formats like Pickle<br>🔹 Using safer alternatives like Safetensors<br>🔹 Managing AI models like any other open-source dependency</p><p>As AI adoption skyrockets, you must proactively safeguard your models against supply chain threats. Check out the full article to learn more: <a href="https://www.darkreading.com/cyber-risk/open-source-ai-models-pose-risks-of-malicious-code-vulnerabilities" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/cyber-risk/ope</span><span class="invisible">n-source-ai-models-pose-risks-of-malicious-code-vulnerabilities</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/HuggingFace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HuggingFace</span></a> <a href="https://infosec.exchange/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MachineLearning</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/riskmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riskmanagement</span></a></p>
Winbuzzer<p>Malicious Code Found in AI Models Shared on Hugging Face <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> #<a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/HuggingFace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HuggingFace</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/PickleSerialization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PickleSerialization</span></a> <a href="https://mastodon.social/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MachineLearning</span></a> <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/OpenSourceAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSourceAI</span></a></p><p><a href="https://winbuzzer.com/2025/02/09/malicious-code-found-in-ai-models-shared-on-hugging-face-xcxwbn/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/02/09/malic</span><span class="invisible">ious-code-found-in-ai-models-shared-on-hugging-face-xcxwbn/</span></a></p>
OWASP Foundation<p>Ready to Secure AI Systems? Join Our 3-Day Hands-On Training at OWASP Global AppSec EU 2025!</p><p>Dive into AI/ML Whiteboard Hacking with expert Sebastien Deleersnyder from May 26-28, 2025 in Barcelona.</p><p>Designed for AI engineers, developers, architects, and security professionals, this intermediate-level training will equip you with practical skills to identify AI-specific threats.</p><p><a href="https://owasp.glueup.com/event/123983/register" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/123983/</span><span class="invisible">register</span></a></p><p><a href="https://infosec.exchange/tags/AppSecEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSecEU</span></a> <a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AISECURITY" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISECURITY</span></a></p>
Michał "rysiek" Woźniak · 🇺🇦<p>I am reading up on abliterations:<br><a href="https://huggingface.co/blog/mlabonne/abliteration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">huggingface.co/blog/mlabonne/a</span><span class="invisible">bliteration</span></a></p><p>Still trying to wrap my head around the consequences of this. But...</p><p>...I kinda feel like abliterations have implications also for prompt injections?</p><p>As in, it feels like abliterations could mean that it is simply impossible to secure an LLM from prompt injection?</p><p>I'm sure I am misunderstanding stuff here. Anyone any input on this?</p><p><a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a></p>
BGDoncaster<p>DeepSeek Exposed! </p><p>Open HTTP ports linked to publicly exposed database, accessible without any authentication at all, allowed full control over database operations - a good thing? NOT! Sensitive data out in the open. </p><p><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wiz.io/blog/wiz-research-uncov</span><span class="invisible">ers-exposed-deepseek-database-leak</span></a> <a href="https://techhub.social/tags/WIZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WIZ</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://techhub.social/tags/database" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>database</span></a> <a href="https://techhub.social/tags/chathistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chathistory</span></a> <a href="https://techhub.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://techhub.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Sooraj Sathyanarayanan<p>Mark my words: AI agents will be the talk of 2025. With each new capability, the attack surface grows. Attackers can poison training data, manipulate decision logic, or use deceptive inputs to trigger unintended behaviors. One compromised agent can infiltrate entire networks. We need adversarial testing and monitoring before deployment.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a></p>
23Ro<p>Currently working on a non-profit in <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISecurity</span></a> ( <a href="https://oais.is" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">oais.is</span><span class="invisible"></span></a> ) with some critical work and are looking for hardware sponsoring. Primarily we are looking for Notebooks that we can run Linux on and burner phones.</p><p>I've tried to reach out to <a href="https://mastodon.social/tags/tuxedo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tuxedo</span></a> computers without feedback. Does anyone have a lead on linux focused hardware shops that offer sponsoring for non-profits?</p><p><a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/alignment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alignment</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxnotebooks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxnotebooks</span></a> <a href="https://mastodon.social/tags/notebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>notebook</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/sponsoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sponsoring</span></a> <a href="https://mastodon.social/tags/non" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>non</span></a>-profit <a href="https://mastodon.social/tags/ngo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngo</span></a></p>